blob: b117c63048dac2fb39175910ae5e5ba859bcdfbf [file] [log] [blame]
vukobd124bd2021-12-28 15:05:59 +01001{ pkgs, workspace, ... }:
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +02002
3let
vukobd124bd2021-12-28 15:05:59 +01004 hscloud = workspace;
5 checkinator = hscloud.hswaw.checkinator;
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +02006
7 name = "checkinator-web";
8 user = name;
9 group = name;
10 socket_dir = "/run/${name}/";
11
Piotr Dobrowolski6c69fcd2021-10-17 00:32:25 +020012 python = pkgs.python3.withPackages (ppackages: with ppackages; [
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +020013 checkinator
Piotr Dobrowolski6c69fcd2021-10-17 00:32:25 +020014 pkgs.python3Packages.gunicorn
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +020015 ]);
16
17 prepare = pkgs.writeShellScriptBin "${name}-prepare" ''
18 rm -rf /mnt/secrets/${name}
19 ${pkgs.coreutils}/bin/install --owner=${user} --mode=500 --directory /mnt/secrets/${name}
20 ${pkgs.coreutils}/bin/install --owner=${user} --mode=400 -t /mnt/secrets/${name} \
21 /etc/nixos/secrets/${name}/secrets.yaml \
22 /etc/nixos/secrets/${name}/ca.pem \
23 /etc/nixos/secrets/${name}/cert.pem \
24 /etc/nixos/secrets/${name}/key.pem
25
26 ${pkgs.coreutils}/bin/mkdir -m 700 -p /var/checkinator-web/
27 ${pkgs.coreutils}/bin/chown ${user} /var/checkinator-web/
28
29 mkdir -p --mode=700 ${socket_dir}
30 chown ${user} ${socket_dir}
31 chmod 700 ${socket_dir}
32 ${pkgs.acl}/bin/setfacl -m "u:nginx:rx" ${socket_dir}
33 '';
34
35 config = builtins.toFile "${name}-config.yaml" (pkgs.lib.generators.toYAML {} {
vukobd124bd2021-12-28 15:05:59 +010036 # local sqlite db for storing user and MAC
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +020037 DB = "/var/checkinator-web/at.db";
38
39 # debug option interpreted by flask app
40 DEBUG = false;
41
42 # url to member wiki page
43 # "${login}" string is replaced by member login (uid)
44 WIKI_URL = "https://wiki.hackerspace.pl/people:\${login}:start";
45
46 CLAIMABLE_PREFIXES = [
47 "10.8.0."
48 "2a0d:eb00:4242:0:"
49 ];
50 CLAIMABLE_EXCLUDE = [ ];
51
52 SPACEAUTH_CONSUMER_KEY = "checkinator";
53 SECRETS_FILE = "/mnt/secrets/checkinator-web/secrets.yaml";
54
55 SPECIAL_DEVICES = {
56 kektops = [ "90:e6:ba:84" ];
57 esps = [
58 "ec:fa:bc" "dc:4f:22" "d8:a0:1d" "b4:e6:2d" "ac:d0:74" "a4:7b:9d"
59 "a0:20:a6" "90:97:d5" "68:c6:3a" "60:01:94" "5c:cf:7f" "54:5a:a6"
60 "30:ae:a4" "2c:3a:e8" "24:b2:de" "24:0a:c4" "18:fe:34" "38:2b:78"
61 "bc:dd:c2" "cc:50:e3" "84:0d:8e"
62 ];
63 vms = [
64 "52:54:00" # craptrap VMs
65 ];
66 };
67
68 PROXY_FIX = true;
69
70 GRPC_TLS_CERT_DIR = "/mnt/secrets/checkinator-web";
71 GRPC_TLS_CA_CERT = "/mnt/secrets/checkinator-web/ca.pem";
72 GRPC_TLS_ADDRESS = "[::1]:2847";
73 });
74in {
75 users.users."${user}" = {
76 group = "${group}";
Piotr Dobrowolskib6bc3e62021-10-16 21:56:59 +020077 isSystemUser = true;
78 uid = 1002;
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +020079 };
80 users.groups."${group}" = {};
81
82 systemd.services."${name}" = {
83 description = "Hackerspace Checkinator web interface";
84 wantedBy = [ "multi-user.target" ];
85
86 serviceConfig.User = "${user}";
87 serviceConfig.Type = "simple";
88
89 environment = {
90 CHECKINATOR_WEB_CONFIG=config;
91 };
92
93 serviceConfig.ExecStartPre = [
94 ''!${prepare}/bin/${name}-prepare''
95 "${pkgs.writeShellScript "checkinator-dbsetup" ''
96 if [ ! -e "/var/checkinator-web/at.db" ]
97 then
Piotr Dobrowolski6c69fcd2021-10-17 00:32:25 +020098 ${pkgs.sqlite}/bin/sqlite3 /var/checkinator-web/at.db < ${checkinator}/dbsetup.sql
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +020099 fi
100 ''}"
101 ];
102 serviceConfig.workingDirectory = checkinator;
103 serviceConfig.ExecStart = "${python}/bin/gunicorn -b unix:${socket_dir}/web.sock at.webapp:app";
104 serviceConfig.ExecStopPost = [
105 ''!${pkgs.coreutils}/bin/rm -rf /mnt/secrets/${name}''
106 ];
107
108 };
109
110 services.nginx.virtualHosts."at.hackerspace.pl" = {
111 forceSSL = true;
112 enableACME = true;
113
114 locations."/static/" = {
Piotr Dobrowolski6c69fcd2021-10-17 00:32:25 +0200115 alias = "${checkinator}/static/";
Piotr Dobrowolskia01905a2021-10-16 18:22:46 +0200116 };
117 locations."/" = {
118 proxyPass = "http://unix://${socket_dir}/web.sock";
119 extraConfig = ''
120 proxy_set_header Host $host;
121 proxy_set_header X-Real-IP $remote_addr;
122 proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
123 proxy_set_header X-Forwarded-Host $host:$server_port;
124 proxy_set_header X-Forwarded-Server $host;
125 proxy_set_header X-Forwarded-Proto $scheme;
126 '';
127 };
128 };
129}